MANAGEMENT

New threat detection services from Rockwell

Rockwell Automation launches new threat detection services

Staff reporter
New threat detection services from Rockwell

PRESS RELEASE: As the number of industrial security threats continues to rise, manufacturers are taking a closer look at risks to their environments. 

Designed specifically for industrial networks, the new set of services map normal network behaviour, and use Rockwell Automation monitoring services to detect and alert operators of irregularities and potential threats in real time. Integrating industrial security software from providers who understand operational functions within industrial protocols can help secure and optimise the industrial control network while offering visibility across all levels of the OT environment. This means not only threat detection, but real-time monitoring and deep network insights across your assets.

“We are seeing security threats bypass network perimeters more easily,” said John Kuenzler, director of strategic advisory services at ARC Advisory Group. “In general, if you can’t prevent a threat before it enters the perimeter, the next best thing is to detect when it gets inside and has the potential to affect operations.”

The first step in successfully detecting threats is to be able to inventory your environment. The threat detection services take a product-agnostic approach to create a robust asset inventory across both IT and OT systems in an industrial operation. Diving deep into industrial network protocols, threat detection software maps all of the end user’s network assets and how they communicate with each other.

“Our threat detection services are a passive, non-intrusive security solution,” said Umair Masud, consulting services portfolio manager at Rockwell Automation. “This is crucial because we don’t want to adversely impact complex, industrial control systems by introducing new traffic onto the network."

Once the entire environment is charted, the tool identifies normal operating procedures and creates a baseline. Any deviations from this baseline are annunciated in the form of context rich alerts. The alerts are integrated with Rockwell Automation monitoring services to help inform the response and recovery process. This process includes incident impact analysis, containment and eradication protocols.

The end user is alerted if a security threat is detected, and the predetermined response plan is enacted based on the criticality of the anomaly. This plan includes defined workflows that safely outline the recovery steps to be taken to return to a fully operational state.

The new set of services is built on top of threat detection software, created by Claroty, an Encompass Product Partner of the Rockwell Automation PartnerNetwork programme.

A growing series of reports, each focused on a key discussion point for the mining sector, brought to you by the Mining Magazine Intelligence team.

A growing series of reports, each focused on a key discussion point for the mining sector, brought to you by the Mining Magazine Intelligence team.

editions

Mining Magazine Intelligence Exploration Report 2024 (feat. Opaxe data)

A comprehensive review of exploration trends and technologies, highlighting the best intercepts and discoveries and the latest initial resource estimates.

editions

Mining Magazine Intelligence Future Fleets Report 2024

The report paints a picture of the equipment landscape and includes detailed profiles of mines that are employing these fleets

editions

Mining Magazine Intelligence Digitalisation Report 2023

An in-depth review of operations that use digitalisation technology to drive improvements across all areas of mining production

editions

Mining Magazine Intelligence Automation Report 2023

An in-depth review of operations using autonomous solutions in every region and sector, including analysis of the factors driving investment decisions